With recent large-scale cyber attack threats gives a growing front in destructive threats and business impact.A new midyear report from iDefense, part of Accenture Security, reveals how threat actors are continuing to evolve their ability to avoid detection.

The 2017 Cyber Threatscape Report examines key trends during the first half of 2017 and explores how cyber incidents may evolve over the next six months.

It covers the increased prevalence of destructive attacks and adversary denial and deception tactics; the aggressive use of information operations by nation-states; and the growth in the numbers and diversity of threat actors.

Other notable observations from the report include:

1. Reverse deception tactics:

Increasing cybercriminal use of deception tactics including anti-analysis code, steganography, and expendable command-and-control servers used for concealment of stolen data. Greater public reporting on cyber threat activity and attribution may accelerate this denial and deception trend, increasing the cost of cyber defense efforts and resource allocations.

Escalation of espionage and disruption activity from state-sponsored actors may likely continue in response to fulfilling strategic collection requirements and geopolitical triggers such as economic sanctions, military exercises and religious conflicts.

4. Alternative crypto-currencies

Bitcoin continues to be the currency of choice among cybercriminals, however, the need to better conceal transactions is forcing cybercriminals to either develop and leverage bitcoin laundering techniques or adopt alternative cryptocurrencies.

5. DDoS-for-hire services – Low-end booter and stresser distributed denial of service (DDoS)-for-hire services have given way to a thriving DDoS-for-hire botnet ecosystem primarily employing domain name system (DNS) amplification. Also, we can expect more diverse IOT devices to be roped into botnets.

6. Greater availability of exploits and tools available to malicious actors – For the remainder of 2017, iDefense expects to see ransomware variants targeting non-Windows platforms, such as Linux and OSX, as well as mobile platforms, such as iOS and Android.